Factors Affecting Digital Banking Customer Satisfaction in Indonesia

Main Article Content

Drajad Wiryawan
Joni Suhartono
Siti Elda Hiererra
Anderes Gui

Abstract

This paper aims to determine the factors that influence the satisfaction of using digital banking. The method used is UTAUT (Model Unified Theory of Acceptance and Use of Technology) 2 Modification to help specify variables such as Responsiveness, Usefulness, Ease of Use, History, Access Control, Data Privacy, Assurance, etc. Trust, Quality Transaction, User Intention, and User Satisfaction. This research collects data in a questionnaire distributed to digital banking users through a non-probability sampling method using a data collection technique, namely, snowball sampling. For information, the number of respondents obtained is 410 respondents, of which 56% are male and 44% are female. Further analysis concluded that the various variables significantly affect user satisfaction in using digital banks. For example, the access control variable has a value of 3.453 (on t-statistics), which shows that the access control variable has a significant value among other variables.

Article Details

Section
Articles

References

M. Majid, "Technology," August 8, 2021. [Online]. Available: https://www.maxmanroe.com/sistem-keamanan-lemah-hacker-gasak-1-triliun-dari-kas-bank-sentral-bangladesh.html.

"Digiserve, Telkom Indonesia," Telkom Indonesia, 11 June 2020. [Online]. Available: https://www.digiserve.co.id/id/insight/blog/melirik-trend-tranformasi-digital-2020-jangan-sampai-tertinggal. [Accessed 8 March 2021].

M. P. Fauzi, "OkeTechno," 11 April 2017. [Online]. Available: https://techno.okezone.com/read/2017/04/11/207/1664388/2017-pengguna-cloud-diperkirakan-mencapai-1-8-juta.

C. Stephanie, "Kompas Tekno," Kompas, 1 January 2021. [Online]. Available: https://tekno.kompas.com/read/2021/01/01/14260027/7-kasus-kebocoran-data-yang-terjadi-sepanjang-2020?page=all. [Accessed 8 March 2021].

N. H. Anjani, "Center for Indonesian Policy Studies (CIPS)," March 10, 2021. [Online]. Available: https://repository.cips-indonesia.org/media/341780-perlindungan-keamanan-siber-di-indonesia-e007bb8a.pdf. [Accessed 20 January 2021].

H. S. P. Harsurinder Kaur, "Anomaly detection survey for information security," in 10th International Conference on Security of Information and Networks, October 2017 Pages 251–258https://doi.org/10.1145/3136825.3136904, 2017.

L. B. Dr. William Stallings, Computer Security: Principles and Practice, Strand, London: Pearson Education, Incorporated, 2018.

F. Shahzad, "State-of-the-art Survey on Cloud Computing Security Challenges, Approaches, and Solutions.," Procedia Computer Science, vol. 37, p. 357–362, 2014.

U. B. R. Sekaran, Research Methods for Business. A Skill Building Approach, 7th Edition ed., UK: John Willey, 2016.

Sugiyono, Metode Penelitian Pendidikan: Pendekatan Kuantitatif, Kualitatif, dan R&D, 23rd ed., Bandung: Alfabeta, 2017.

C. A. C. Mostafa Sayyadi, "TrainingMag," January 15, 2021. [Online]. Available: https://trainingmag.com/5-critical-factors-for-managing-knowledge/.

A. A. R. J. W. G. B. W. Madini O. Alassafi, "A framework for critical security factors that influence the decision of cloud adoption by Saudi government agencies," Telematics and Informatics, vol. 34, no. 7, pp. 996-1010, November 2017.

A. M. A. Jsv Sai Bhargav, "A Review on Cryptography in Cloud Computing," International Journal of Scientific Research in Computer Science Engineering and Information Technology, vol. 6, no. 6, pp. 225-230, December 2020.

S. S. &. J. Singh, "Cloud Data Security using Authentication and Encryption Technique," Global Journal of Computer Science and Technology Cloud (GJCST), vol. 13, no. 3, 2013.

B. K. Onankunju, "Access Control in Cloud Computing," International Journal of Scientific and Research Publications, vol. 3, no. 9, September 2013.

KeithLewis, "Chapter 66 - Virtual Private Cloud Security," in Computer and Information Security Handbook, 3 ed., J. R. Vacca, Ed., kCura, Chicago, IL, United States, Elsevier Inc, 2017, pp. 937-942.

V. a. G. B. a. P. P. Indrani, "Perception of Network and Protection Concerns In Cloud Computing," International Journal of Innovative Research in Engineering & Management (IJIREM), vol. 7, no. 4, July 2020.

E. C. a. H. Bakırtaş, "Technology Acceptance Model 3 in Understanding Employee's Cloud Computing Technology," Sage Journal, p. 1–20, 2020.

R. C. H. J. Sarstedt M., Partial Least Squares Structural Equation Modeling. In: Homburg C., Klarmann M., Vomberg A.E. (eds) Handbook of Market Research, Hamburg, Germany: Springer, Cham., 2021.

I. Ghozali, Aplikasi Analisis Multivariate dengan IBM SPSS 23, 8 ed., Semarang: Badan Penerbit Universitas Diponegoro: Universitas Diponegoro , 2016.

M. S. Rosli, "Improving Questionnaire Reliability using Construct Reliability for Researches in Educational Technology," International Journal of Interactive Mobile Technologies (iJIM), vol. 15, no. 04, p. 109, 2021.

M. T. Brannick, "Course Materials and Research Website," 2020. [Online]. Available: http://faculty.cas.usf.edu/mbrannick/regression/Pathan.html.

J. H. A. C. F. S. Jose Benitez, "How to perform and report an impactful analysis using partial least squares: Guidelines for confirmatory and explanatory IS research," Information and Management, 2019.

"Kemeninfo," Berita Kemeninfo, 11 September 2020. [Online]. Available: https://www.kominfo.go.id/content/detail/30653/dirjen-ppi-survei-penetrasi-pengguna-internet-di-indonesia-bagian-penting-dari-transformasi-digital/0/berita_satker. [Accessed 8 March 2021].